Analysis

  • max time kernel
    56s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 03:52

General

  • Target

    huorong.msi

  • Size

    23.2MB

  • MD5

    1d3c6fa65ced640eb43db10be0d86a9e

  • SHA1

    3b2bf4a8ac29132b467137532b6f22bde476dc6a

  • SHA256

    32afffe939b5da15c19766da3cc587445da11b038434aa0c584dbca1ee1e8e9f

  • SHA512

    4baf23f720702c9c4f0aef1c271ba51d2fc6e9a8f9e7c5d16ec1e4c90adcd1b234b84c70cb6c0dff37f85fe6d4ab97836c1399ad08038b4ac363f1c3a19f177c

  • SSDEEP

    393216:Dzw0seFgtYZuNISGXEp4nodoU9JF3SZjun+9WIkpyICVEL075qp+T9GHltWllUjk:v4YuYyGXLnodoUXF+unKxjQp+T8FUnUK

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\huorong.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4420
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:100

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads